What type of an attack is being executed if an attacker substituted an invalid mac address for the network gateway so no users can access external networks?

Answers

Answer 1

ARP poisoning If an attacker changed the network gateway's MAC address to an incorrect one so that no users can access external networks, the attack is being carried out.

What is the MAC address of a device?A network interface controller (NIC) is given a media access control address (MAC address), which it can use as a network address in communications inside a network segment.Ethernet, Wi-Fi, and Bluetooth are just a few of the IEEE 802 networking technologies that frequently employ this application. Your home network's devices each have a distinct MAC address. Each network adapter on your computer that has its own MAC address, such as an Ethernet adapter and a wireless adapter.

To learn more about  MAC address, refer to:

https://brainly.com/question/24812654

#SPJ4


Related Questions

Can u write a python program with this output

Can u write a python program with this output

Answers

Answer:

Not exact, but it will help.

Explanation:

do something like this.

       print("""

       this program will help you plan your garden.

       First, we need some information about the dimensions you want.

       """)

       while True:

           try:

               response = int(input("Please enter the side length for your garden (in feet) : "))

           except ValueError:

               print("(!)Please Enter A Number(!)")

               print("")

               continue

           if str(response) == "":

               continue

           else

               length = int(response)

               break

repeat stuff like that up above for the rest, and then you can decide what to do with the variables and how they need to be multiplied for the output. Good luck!

                       

what are the differences between Cc & Bcc in emails that are sent ?​

Answers

Cc stands for " carbon copy " and Bcc stands for " Blind carbon copy ". The difference between Cc and Bcc is that carbon copy (CC) recipients are visible to all other recipients whereas those who are BCCed are not visible to anyone.

Answer:

CC- Carbon copy

BCC- Blind carbon copy

Explanation:

What does CC mean?

In email sending, CC is the abbreviation for “carbon copy.” Back in the days before internet and email, in order to create a copy of the letter you were writing, you had to place carbon paper between the one you were writing on and the paper that was going to be your copy.

Just like the physical carbon copy above, CC is an easy way to send copies of an email to other people.

If you’ve ever received a CCed email, you’ve probably noticed that it will be addressed to you and a list of other people who have also been CCed.

What does BCC mean?

BCC stands for “blind carbon copy.” Just like CC, BCC is a way of sending copies of an email to other people. The difference between the two is that, while you can see a list of recipients when CC is used, that’s not the case with BCC. It’s called blind carbon copy because the other recipients won’t be able to see that someone else has been sent a copy of the email.

hope it helps! please mark me brainliest..

Merry Christmas ! good day

Computerized spreadsheets that consider in combination both the
risk that different situations will occur and the consequences if
they do are called _________________.

Answers

risk assessment spreadsheets or risk analysis spreadsheets

Both answers are correct

The given statement refers to computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do which are called decision tables.

A decision table is a form of decision aid. It is a tool for portraying and evaluating decision logic. A decision table is a grid that contains one or more columns and two or more rows. In the table, each row specifies one rule, and each column represents a condition that is true or false. The advantage of using a decision table is that it simplifies the decision-making process. Decision tables can be used to analyze and manage complex business logic.

In conclusion, computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do are called decision tables. Decision tables can help simplify the decision-making process and can be used to analyze and manage complex business logic.

To know more about spreadsheets visit:

https://brainly.com/question/31511720

#SPJ11

What are the benefits of transferable skills check all the boxes that apply

Answers

Answer:

They allow easy cross-company transfers.

They help a person develop self-esteem.

They open up a variety of employment options.

Explanation:

Answer:

Las habilidades duras son cuantificables y, en ocasiones, exclusivas de una profesión (como la capacidad de un idioma

Explanation:

Choose the true statement below. (html)
-Content should be contained in the head tags - Element tags can/should go between the head and body tags
-Content should be contained in the body tags
- All answers listed​

Answers

Answer:

content should be contained in the body tags

Investigate the Internet of Things. Select one example and describe what it is and how it works. Submit your findings here

Answers

The Internet of Things (IoT) refers to the network of physical devices, vehicles, home appliances, and other items that are connected to the Internet and can collect and exchange data. One example of an IoT device is the smart thermostat, which allows users to remotely control their home's heating and cooling systems using a mobile app or web interface.

Smart thermostats work by connecting to a home's Wi-Fi network and using sensors to collect data on temperature, humidity, and other environmental factors. This data is then analyzed by the thermostat's software, which uses algorithms to adjust the heating and cooling systems based on user preferences and energy-saving settings.

In addition to remote control and automation, smart thermostats can also provide users with insights and analytics on their energy usage, helping them to identify areas where they can reduce waste and save money on their utility bills. Some smart thermostats also offer integration with other smart home devices, such as voice assistants, smart lighting, and security systems, allowing for seamless automation and control of all connected devices.

To learn more about the Internet of Things, visit:

https://brainly.com/question/19995128

#SPJ11

We used the _____ operator to designate the outcome variable, and the _____ operator to calculate the R-square value in rapid miner

Answers

In RapidMiner, we used the "Set Role" operator to designate the outcome variable and the "Performance" operator to calculate the R-square value.

In machine learning, the outcome variable is often referred to as the target variable or dependent variable. It is the variable that the model will be trained to predict or estimate based on the input variables or features.

Therefore, in RapidMiner, we use the "Set Role" operator to designate the outcome variable.To calculate the R-square value, we use the "Performance" operator. R-square is a metric that measures the proportion of variance in the outcome variable that is explained by the model.

It is used to evaluate the goodness of fit of the model. The higher the R-square value, the better the model fits the data. The formula for R-square is 1 - (SSR/SST), where SSR is the sum of squared residuals and SST is the total sum of squares.

Learn more about rapidminer at:

https://brainly.com/question/30427656

#SPJ11

A homeowner is planning to use carpet tiles to cover the floor of a room measuring 9 feet by 10 feet 8 inches. If the carpet tiles are 8 inches wide and 1 foot long and there are no gaps between the tiles as they are placed on the floor, how many carpet tiles will the homeowner need to cover the floor of the room?​

Answers

If the carpet tiles are 8 inches wide and 1 foot long, and there are no gaps between them as they are placed on the floor, the homeowner will need 144 carpet tiles to cover the floor of the room.

Given room dimensions of 9feet*10feet 8inch

tile dimensions of 8inch*1foot,

we can calculate

the number of tiles required. 1 foot=12 inch

number of tiles=area of room/area of tiles

               =(9*12)inch*(12*10+8)inch/8inch *12 inch

               =144

A homeowner is someone who owns a house or apartment in which they live.

This is the most common written policy for a homeowner, and it is intended to cover all aspects of the home, structure, and contents.

Most homeowner policies include replacement cost coverage for the home and actual cash value coverage for personal property.

A homeowner is someone who owns a house or apartment in which they live.

Learn more about homeowner here:

https://brainly.com/question/15243238

#SPJ4

Universal Containers uses a custom object within the product development team. Product development, executives, and System Administrators should be the only users with access to records of this object. Product development needs read/write access to all the records within the object, while the executives should only be able to view the records. How can the System Administrator configure the security model to meet these requirements

Answers

Answer:

The answer is below

Explanation:

Considering the scenario described in the question, the right answer is that, the System Administrator would configure the security model to meet these requirements by setting the Organization-Wide Defaults for the custom object to Private.

Then follow by giving the Product Development Modify All for the object; And finally, give the Executive Profile View All access.

Which tool was developed for packet flow monitoring and was subsequently included in Cisco routers and switches

Answers

Wireshark. It’s a free tool used to analyze packets.

A group of students writes their names and unique student ID numbers on sheets of paper. The sheets are then randomly placed in a stack.

Their teacher is looking to see if a specific ID number is included in the stack. Which of the following best describes whether their teacher should use a linear or a binary search?

A. The teacher could use either type of search though the linear search is likely to be faster
B. The teacher could use either type of search though the binary search is likely to be faster
C. Neither type of search will work since the data is numeric
D. Only the linear search will work since the data has not been sorted

Answers

Answer:

D.

Explanation:

Binary searches are required to be first sorted, since they use process of elimination through halving the list every round until the answer is found. Linear searches just start from the beginning and check one by one.

When Tomohiro Nishikado invented Space Invaders® in 1978, the microcomputers available in Japan could not handle its initial complexity which led Nishikado to import a CPU from the United States that was integrated into a microprocessor. This is a classic example of what?

A. innovating to overcome a technical challenge


B. the need to import items for any technology to really work


C. how the U.S. is better with technology than Japan


D. quitting when technical challenges arise

Answers

b the need to import items for any technology to really work

Answer:

The answer is A. Innovating to overcome a technical challenge!

hope this helps! <3

Under which accounting method are most income statement accounts translated at the average exchange rate for the period ?
A) current/concurrent method
B) monetary/nonmonetary methode
C)temporal method
D)All of the options

Answers

Under the accounting method where most income statement accounts are translated at the average exchange rate for the period, the correct option is D) All of the options.

The current/concurrent method considers both monetary and nonmonetary balance sheet items and translates income statement accounts at the average exchange rate for the period. This method takes into account the fluctuations in exchange rates throughout the period and provides a more accurate representation of the financial results in the reporting currency.

By using the average exchange rate, the impact of exchange rate fluctuations on income statement accounts is spread out over the period, reducing the impact of currency volatility on reported earnings.

Learn more about accounting method here: brainly.com/question/30512760

#SPJ11

which type of attack is wep extremely vulnerable to?

Answers

WEP is extremely vulnerable to a variety of attack types, including cracking, brute-force, IV (Initialization Vector) attack, and replay attack.

What is Initialization Vector?

An Initialization Vector (IV) is a random number used in cryptography that helps to ensure the uniqueness and randomness of data used in an encryption process. The IV is typically used as part of an encryption algorithm, where it is combined with a secret key to encrypt a message. The IV is unique for each encryption session, and must be unpredictable and non-repeating. A good IV should not be reused across multiple encryption sessions, and it should be kept secret from anyone who does not have access to the decryption key. Without a good IV, a cryptographic system can be vulnerable to attacks such as replay attacks, where an attacker can gain access to the system by repeating an encrypted message.

To learn more about Initialization Vector
https://brainly.com/question/27737295
#SPJ4

P.W. Singer jokes about how many people are using Wang computers. What point is he making with this joke?

Answers

P.W Singer stated:

"And think about it this way: We don't use Wang computers anymore, or Commodore 64s, kids don't play Atari videogames. Those companies may have been at the forefront of the digital revolution, they're not anymore. Same thing in war. You know the British invent the tank. The Germans figure out how to use the tank better,"

Enjoy

Please have a great day <3

TRUE OR FALES

1.Windows 98 is not a GUI-based operating system.

Answers

Answer:

TRUE

Explanation:

t is a graphical user interface (GUI) based operating system. Which makes our operation interactive and easy to use. Windows 98 is an improved version of Windows 95. Main feature in windows 98 is its 'Desktop'.

Who is obsessed with Stranger Things, and waiting for the new season?!?!

Answers

Answer:

Me

Explanation:

Answer:

ME I CANNOT WAIT I'VE BEEN WAITING EVER SINCE ME AND MY STRANGER THINGS OBSESSED REALLY CLOSE FRIEND AND I FINISHED SEASON 3 THE DAY IT CAME OUT

Explanation:

How do you get the ios16 update back when you accidentally deleted it?

Answers

Answer:

Explanation:

Sign in to your iCloud account. Tap “Choose backup” and then select the backup you made before in iCloud and tap “Restore”. Then wait for the restoration process to get complete.

Im building my first gaming pc, got any part suggestions or tips?

Answers

Answer:

You should find a good game engine that is not hard. Unity and Unreal are some good ones.

You should also search for the programming language you like the most, and use engines that use that specific language.

Answer:

When building your own gaming pc make sure to make it uniqur since it's going to be an original. I would recommend makeing a design that makes it "you" to say. Make the design likable, not too complex. Make the color a color that is neutral, not everyone likes a neon color. I'm not very familiar with many gaming parts but, you can search up simple pc parts online and dig into gaming PCs being sold.

Explanation:

Hope this helps! UwU

We informally define the term corresponding element as follows: The first element and the last element of a list are corresponding elements. Similarly, the second element and the second last element are corresponding elements. The third element and the third last element are corresponding elements -- and so on. Given that the variable a is associated with a list, write an expression for the corresponding element of a[i].

Answers

Answer:

a[i] = a[len(a) - i - 1]

Explanation:

Based on the definition of corresponding elements above,

First element of a list and last element are corresponding :

Using this :

Given a list defined as 'a'

First element of list is at index 0

Last element of a list is at index ; len(a) - 1

For a list containing 10 elements:

Second element corresponds to second to the last element

Second element is at index 1;

Second to the Last element is at index 8

(since indexing starts from 0)

Second element = a[1]

Second to the last element = a[len(a) - i - 1]

Hence,

a[i] = a[len(a) - i - 1]

What invention was created to try to enforce copyright protection on digital products

Answers

What invention was created to try to enforce copyright protection on digital products?

Digital Rights Management (DRM) systems

Digital rights management (DRM) is a set of access control technologies for restricting the use of proprietary hardware and copyrighted works. "Pay-per-use" policies were meant to prevent intellectual property from being copied freely, just as physical locks are needed to prevent personal property from being stolen.

need help on question 5! no links pls

need help on question 5! no links pls

Answers

Answer: less than 50%, it’s about 49%

Explanation:

Answer:

59.5

so I would say the 3 third option

1. you have been asked to develop a small application that analyzes each course offered by a university and reports the average grade obtained in the course (for a given term). write a statement of scope that bounds this problem.

Answers

It's important to note that the scope of the application may vary depending on specific requirements and constraints. Additional features such as filtering by department, exporting the results to a file, or visualizing the data through charts can be considered to enhance the functionality of the application. The scope can be adjusted accordingly based on the needs and resources available for development.

Statement of Scope:

The scope of developing a small application that analyzes each course offered by a university and reports the average grade obtained in the course for a given term involves the following steps:

1. Gathering data: The application needs to collect data on each course offered by the university, including the course name, term, and grades obtained by students. This data can be obtained from the university's student information system or any other relevant source.

2. Filtering by term: The application should allow the user to specify a particular term for which they want to analyze the average grade. This will involve filtering the collected data to only include courses offered in that term.

3. Calculating the average grade: Once the data for the specified term has been filtered, the application needs to calculate the average grade for each course. This can be done by summing up the grades obtained by students in each course and dividing it by the total number of students who took the course.

4. Reporting the results: The application should provide a clear report displaying the average grade obtained in each course for the specified term. The report can be in the form of a table or a list, showing the course name and its corresponding average grade.

5. User-friendly interface: The application should have a user-friendly interface that allows users to easily input the term they want to analyze and view the results in an organized manner. This can be achieved through a graphical user interface (GUI) or a command-line interface (CLI) depending on the target audience and platform.

It's important to note that the scope of the application may vary depending on specific requirements and constraints. Additional features such as filtering by department, exporting the results to a file, or visualizing the data through charts can be considered to enhance the functionality of the application. The scope can be adjusted accordingly based on the needs and resources available for development.

To know more about Statement of Scope, visit:

https://brainly.com/question/6593029

#SPJ11

[TURN OVER CST.2006.13.6 7 Compiler Construction (a) Explain the differences (illustrating each with a small program) between (i) static and dynamic binding (scoping); [4 marks] (ii) static and dynamic typing. [2 marks] (b) Java is sometimes said to be "dynamically typed" in that a variable whose type is (class) C can be assigned a value of (class) D provided that D extends C; conversely a variable of type D can be assigned a value of type C using a cast. Give a brief and rudimentary clarification of the standards of how the language
coming about because of part (b) may be utilized to make a sentence structure analyser taking a
token stream as information (by means of calls to work lex()) and giving as result an
theoretical language structure tree relating to. Design for the Data Structures and Algorithms (a) Describe how the Lempel Ziv text compression algorithm works, illustrating your answer by deriving the sequence of numbers and corresponding bit patterns it would generate when applied to a string starting with the following 24 characters: ABCDABCDABCDABCDABCDABCD ... You may assume that the initial table is of size 256 (containing bytes 0 to 255) and that the codes for "A", "B", "C" and "D" are 65, 66, 67 and 68, respectively. [12 marks] KIT107 Programming Due Date - Here is the background information on your task. A client has asked you to plan out the tasks required to medical image manager. They have two developers available to work on the project, and the client would like to have a prototype to review after three sprints. When planning out the tasks required to this prototype, leave space in the last sprint for testing and bug fixes!
The client has provided basic wireframes for what the prototype should look like, the images to populate the application, and a CSV file containing the relevant metadata. add_album_to_collection()
o The first album for the collection 1 o The first album for a new year 1 o Adding an album to an existing year 1 o Maintain ascending order of year 2
• breakdown_by_year()
Each variable declaration is commented 4 The program will be marked out of 72.
and Cheating:Practical assignments are used in the ICT discipline for students to both reinforce and demonstrate their understanding of material which has been presented in class. o Getting Input 1 o Swapping values if required 1 o Correct range 1 o Correct Data 1 o Correct *s 2 • print_artist()
o Showing title 1 o Input 1 o Finding and Showing album details 2 o Accumulating and Showing total sales 1
• highest_ever()
o Showing title 1 o Answer found, and shown, including no data 1
Uses correctly the C naming conventions 4 Alignment of code and use of white space makes code readable 4 Always uses blocks in branch and loop constructs 4 Meaningful identifiers 4 Variables defined at the start of functions only 4
Header comments for the program (author, date etc) 4. How could this problem be overcome? [2 marks]

Answers

The given text contains multiple questions and prompts related to different topics in computer science, including compiler construction, data structures and algorithms, and programming. The questions cover concepts such as static and dynamic binding and typing, the Lempel Ziv text compression algorithm, and planning tasks for a medical image manager prototype. The questions also address coding standards, cheating prevention, and problem-solving approaches. Due to the diverse nature of the questions, a comprehensive summary cannot be provided in two lines.

The given text includes various questions and prompts related to different aspects of computer science. The first part addresses the differences between static and dynamic binding (scoping) and static and dynamic typing, providing examples to illustrate each concept. The second part focuses on the Lempel Ziv text compression algorithm and requires an explanation of how it works, including deriving the sequence of numbers and corresponding bit patterns for a given string. The third part involves planning tasks for a medical image manager prototype, considering wireframes, image data, and metadata. It also mentions requirements for specific functions and coding standards. Lastly, there is a brief mention of cheating prevention and potential problem-solving approaches. Each question and prompt requires a detailed response, and further information is needed to provide a comprehensive answer within the given word limit.

Learn more about dynamic binding here:

https://brainly.com/question/33460360

#SPJ11

Implement a stack algorithm assuming there is a known bound on the difference between the total number of successful pushes and pops to the stack in any state of the execution.

Answers

A stack algorithm can be implemented assuming a known bound on the difference between the total number of successful pushes and pops to the stack in any state of the execution.

What is the implementation approach for a stack algorithm with a known bound on the difference between pushes and pops?

To implement a stack algorithm with a known bound on the difference between pushes and pops, we can use a fixed-size array or a dynamic array (such as a vector in some programming languages) to represent the stack.

Additionally, we need to track the number of elements currently in the stack to ensure it does not exceed the specified bound. In this implementation, we perform checks for every push and pop operation to ensure that the stack size remains within the bound. If the stack is full and a push operation is requested, we reject the push. Similarly, if the stack is empty and a pop operation is requested, we reject the pop. By enforcing this constraint, we guarantee that the difference between pushes and pops never exceeds the specified bound.

Learn more about stack algorithm

brainly.com/question/32088047

#SPJ11

Yara needs to provide step-by-step instructions to her staff on how to use a new system for
conducting performance reviews. What is the best tool for communicating this information?
A) Spreadsheet
B) Email
C) Direct messaging
D) Slides

Answers

Answer:

D) Slides

Explanation:

A slide is exactly one page of presentation commonly used in PowerPoint. It is usually shown via a series of image slides on a projected screen.

This is the best tool Yara needs to provide step-by-step instructions to her staff on how to use a new system for conducting performance reviews.

Slides would be very helpful as they would show the steps one at a time to the members of Yara's staff so they can learn better and faster.

How many are there mouse actions performed by two mouse button.

Answers

Answer:

2?

Explanation:

because there are two buttons im guessing

onsider the iterator abstract data type. which of the following statements is true?: * a) it is able to iterate over any container in o(1) b) it is able to traverse a container, isolate its internal structure and access its elements safely c) it provides a method to iterate the container in a user-defined order d) it should be a method provided by the list data structure

Answers

The iterate enables the programmer to retrieve all container elements while keeping them separate from the internal container structure.

What is an example of abstract data type?

ADTs are data types in which only behavior, not implementation, is specified. Composite Data Type (CDT), which includes an implementation of ADT, is the opposite of ADT. ADTs include, for instance, arrays, lists, maps, queues, sets, stacks, tables, trees, and vectors.

What does C++'s abstract data type mean?

A class with a predetermined set of actions and values is referred to as an abstract type of data (or ADT). To protect the full inner logic from the user, the starter motor might be created as a complete abstract data type.

To know more about abstract data type visit:

https://brainly.com/question/13156070

#SPJ4

Ptolemy believed that Earth was at the center of the universe. Kepler believed that the sun was at the focus of Earth's elliptical orbit. Which of these statements best explains why Ptolemy and Kepler made different observations about the solar system?



The focus of their study was different.


or


They could not match the data with the observations.

Answers

Answer:

The correct option is;

They could not match the data with the observations

Explanation:

Ptolemy proposed the geocentric model based on the observation that the from there are equal number of above and below the horizons at any given time, which didn't match the data observed

Kepler believed the Sun was the focus of Earth's elliptical orbit due to disparities between data in Tycho Brahe's astronomical records and the geocentric model of the solar system.

Therefore, Ptolemy and Kepler made different observations about the solar system because they could not match the data with the observations.

Answer:

the second one.

Explanation:

They could not match the data with the observations.

what is a non-example of job skill

Answers

Answer:

call center/phone/fax.....

Other Questions
Here are two datasets: Dataset A: 64 65 66 68 70 71 72 Dataset B: 64 65 66 68 70 71 720 For dataset A, the mean and median are 68. Looking at dataset B, notice that all of the observations except the last one are close together. Which measure will be affected by this last observation in dataset B aThe following question has two parts. Answer Part A first, and then Part B.Part AWhich claim about British rule do the ideas in this passage most clearly develop?OA. The British government is likely to declare war on the colonies in the nearfuture.OB. The British government has stated that it will accept nothing less thansubjugation.OC. The British government has proven itself untrustworthy because of its pastactions.OD. The British government has armies that are more powerful than the colonialarmies.Port R WILL GIVE BRAINLIESTA student was calculating the residuals of a linear regression equation. The largest residual value found was between 0.90 and 1. What could be said about the data? diabetes is a common illness seen in primary care. using evidence-based practice, what screening would you need to make to ensure these patients are getting adequate care and health promotion. VI. A dart is equally likely to land at any point inside a circle of radius 3 . Let R be the distance from the landing point to the origin. Find 1. P(R Find the area of the bedroom with the shape shown in the figure, in square feet. (Brainliest to the person that get its right)Which of the following is the square of a binomial?A)m^2-mn+n^2B)c^2-2cd+d^2C)16x^2 + 9y^2D)a^2+b^2 PLEASE HELP!!!Read the sentence.For people gifted with mathematical minds, assimilating the principles of astrophysics may come easily, but I have to work hard to understand the workings of the universe.What does assimilating mean?teaching to othersspreading apartfailing to learnpiecing together Which of the following is not a body of water that has coastline with Mexico?a. Gulf of CaliforniaC Gulf of Bajab. Pacific Oceand. Gulf of Mexico the element which makes up the framework of organic compounds and which cycles through all ecosystems is All the elements, individuals, or units of interest to researchers for a specific study are called thea) data set.b) sample.c) population.d) focus group.e) target market. our textbook argues that, in contrast to tourism in north america and europe, tourism in the developing world is characterized by which of the following? actions that allow oligopoly firms to coordinate their pricing behavior without explicit collusion are referred to as . a. independent practices b. facilitating practices c. differential pricing strategies d. strategic behavior e. duopoly price discrimination mechanisms consumer credit dates back to colonial times where farmers came to use it extensively True False What is the greatest possible turning points of f(x) = 6x^4+11^3-x^2+x^7 Suppose a company uses wood pulp (chemically processed wood) instead of recycled materials to make paper. What is the opportunity cost of the companys choice? the nurse is caring for a 76-year-old client who has an unsteady gait. which method is most appropriate to assist in transferring? So... What's the answer to this?? Find the value of the trigonometric function.12/55/1213/1212/13 Find the first four nonzero terms in a power series expansion of the solution to the given initial value problem. y 4e 3xy=0;y(0)=3 y(x)=+ (Type an expression that includes all terms up to order 3.) help me please ??? asap ?